Vulnerabilities / Threats
6/10/2013
02:49 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Palo Alto Networks Brings WildFire To The Private Cloud

Palo Alto Networks WF-500 appliance offers sandbox detection and analysis capabilities

Santa Clara, Calif., June 3, 2013 – Palo Alto Networks® (NYSE: PANW), the network security company&trade, today announced availability of the Palo Alto Networks WF-500 appliance, the first platform designed to deliver a private cloud solution for timely and thorough detection, analysis and prevention of advanced persistent threats (APTs).

Designed to meet the needs of customers with restrictions that preclude them from accessing a public cloud option, the Palo Alto Networks WF-500 appliance delivers the comprehensive sandbox detection and analysis capabilities of the Palo Alto Networks public cloud based WildFire subscription offering on a customer-owned platform. When deployed with an inline Palo Alto Networks next-generation firewall, the WF-500 also offers full prevention capabilities.

Only Palo Alto Networks offers this kind of "closed loop" prevention solution that includes private or public cloud deployment options, thorough detection and analysis of all network traffic, and the ability to automatically block malware and APTs with the Palo Alto Networks next-generation firewall.

QUOTES

· Securosis Analyst and President Mike Rothman commented on the benefits of a private cloud approach in a recent blog ("Network-based Malware Detection 2.0: Scaling NBMD"): "These malware-analysis private clouds provide a central analysis device and interact with enforcement points throughout the network. This provides the leverage of not having to deploy NBMD devices at all ingress points, as well as facilitating internal sharing of intelligence."

· "Quickly identifying and eliminating previously unknown threats across all applications is key to protecting an organization from today's advanced threats; only Palo Alto Networks offers its customers a public or private cloud deployment choice and the closed loop capabilities to most efficiently and effectively stop APTs," said Lee Klarich, senior vice president of product management, Palo Alto Networks.

Wildfire offers Superior Detection, Analysis and Prevention

Now used by more than 1,700 customers globally, the WildFire service aggregates suspicious files flagged by Palo Alto Networks next-generation firewalls deployed at customer sites around the world. The files are uploaded for analysis by Palo Alto Networks systems and experts. If a file is determined to be malware or an APT, a signature is generated and automatically sent to subscribing Palo Alto Networks WildFire customers' next-generation firewalls to provide protection from:

· The newly detected malware and its variants;

· Traffic that malware generates including unique domain queries; and

· Command-and-control and domain name system (DNS) traffic.

The WF-500 appliance offers these same advantages on a secure device inside the customer's network. Customers are then free to detect, analyze, and eradicate suspected threats in a private cloud under their control. If they choose to, they are also free to share confirmed findings with or receive updated malware signatures from the WildFire cloud service.

Availability

The Palo Alto Networks WF-500 appliance is available now. For more information and pricing, contact a local reseller or visit http://www.paloaltonetworks.com.

About Palo Alto Networks

Palo Alto Networks is the network security company. Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 12,500 customers in over 100 countries. For more information, visit www.paloaltonetworks.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.